Тёмный

The Computer Virus That is Puzzling the Internet | BadBIOS 

NationSquid
Подписаться 414 тыс.
Просмотров 173 тыс.
50% 1

Stop data brokers from exposing your information. Check out my sponsor aura.com/natio...
to get a 14-day free trial and see if your personal information has been compromised.
Since the dawn of time, the world has been filled with threats and those who try to understand them. And this applies to the digital world as well, and there was certainly a time, not too long ago in fact, where most people didn’t understand these threats at all. So, throughout the 1990s, on the NEW worldwide web, you end up having these mass panics of computer viruses with alleged capabilities that go beyond the screen, almost supernatural. And of course, many people rode on these fears either in jest or to obtain some kind of control on those who are gullible. Just like how the satirical tabloid “Weekly World News” once published a story about a computer virus that can spread to humans. Because that’s ridiculous! We all know how a computer virus works, it’s a malicious piece of code that is able to replicate itself and infect other computers on the same network, whether it’s the internet or some kind of local network, where it can then do whatever it is programmed TO do. And that’s the key, you need SOME kind of connection to another computer. It’s not a real virus in the literal sense; it can’t spread through the air, right?
Well in October of 2010, something very unnerving allegedly happened. A man named Dragos Ruiu, the main developer behind the annual Pwn2Own hacking competition. He had just installed a new copy of Mac OS X on his MacBook Air, and it was then that he started to notice the computer suddenly had a mind of its own. For starters, his CD drive was no longer working, he couldn’t boot from any CD placed into his system. He thought okay, maybe this was just a hardware issue, but then noticed that all of his system configurations kept undoing themselves. His system data then started getting deleted. He was starting to think that this wasn’t a hardware issue, but instead some kind of malware. So he went ahead and completely wiped the hard drive and reinstalled the operating system, but sure enough, the problem still persisted. As it turned out, this issue wasn’t coming from the hard drive, but the BIOS, the motherboard of the computer, meaning that even a full system restore couldn’t fix it. But it doesn’t even stop there. He noticed that this malware was now spreading across other computers on his network, even ones with different operating systems. He quickly disconnected them from his network, but it just kept going. And so, as a last resort, he disabled his Wi-Fi and Bluetooth and even unplugged the power from his wall, relying only on the battery. This is a technique called “air-gapping,” as these computers were now completely independent from one another, in their own separate worlds…yet the virus was still spreading, even to computers who were never connected to the internet in the first place.
The malware became known as “BadBIOS,” which was capable of infecting Mac, Windows, Linux, and BSD systems, and word quickly started getting around the internet that it may just be the very first instance of a computer virus spreading through the air, quite literally. Through its strange, completely unknown engineering, it was somehow able to bypass these “air gaps.” Surprisingly, it gets even weirder…actual word of the virus seems to have spread faster than the virus itself, and that’s because we...don’t even know if it exists. BadBIOS has become an incredibly controversial, divisive subject within niche parts of the tech community, with some people swearing by it, others scoffing at how ridiculous it is, and then those who believe it to be nothing more than an elaborate hoax. And today, we are going to talk about this strange origin story. This is BadBIOS, the world’s most mysterious computer virus.
Support me on Patreon!
/ nationsquid
Join this channel to get access to perks:
/ @nationsquid
Twitter: / nationsquidyt
Website: www.nationsquid...
Merchandise: teespring.com/...
Buy Me a Coffee: www.buymeacoff...
Google +: just kidding.
Wholesome by Kevin MacLeod
Link: filmmusic.io/s...
License: filmmusic.io/s...
All images, sounds, and clips are either created by me, properly licensed, in the public domain, under a Creative Commons license with attribution provided, or protected under Fair Use.
Creative Commons images used:
CC: Grm wnr
CC: Bobby B
CC: Bill Bertram
CC: SecretLondon123
ENJOY THE PROGRAM.

Опубликовано:

 

22 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 741   
@nationsquid
@nationsquid 8 месяцев назад
Stop data brokers from exposing your information. Check out my sponsor aura.com/nationsquid to get a 14-day free trial and see if your personal information has been compromised.
@eglol
@eglol 8 месяцев назад
Your videos are always so interesting and fun to watch.
@batorerdyniev9805
@batorerdyniev9805 8 месяцев назад
Hi
@VanadiumMC
@VanadiumMC 8 месяцев назад
I like extra mustard too 🤣🤣
@thatoneglitchpokemon
@thatoneglitchpokemon 8 месяцев назад
Hi
@tubbunny
@tubbunny 8 месяцев назад
Hi @nationsquid, I have a question. Is there a service that can delete spam mail automatically or filter maybe?
@Robdeltonie
@Robdeltonie 8 месяцев назад
I think I can debunk this once and for all: If the OP said the CD drive stopped working on his MacBook Air, then it's a hoax. It's impossible for a MacBook Air's CD drive to stop working. That's because they never had one. MacBook Airs never had a CD or DVD drive of any kind. It was one of the things mentioned in the keynote where Steve Jobs first announced the computer. So, if that's the first "symptom" of BadBIOS that Dragos Ruiu noticed, then I think it's safe to say the whole thing is made up.
@w32u64
@w32u64 8 месяцев назад
Nevertheless, there was (and maybe still is) an official Apple USB SuperDrive to accomplish OS X installation, even 2010 MacBook Airs came with OS X 10.6 restore DVDs, but you did still need to buy SuperDrive separately to use those disks
@FunkyFurret
@FunkyFurret 8 месяцев назад
@@w32u64Yes, so they probably meant that.
@deykiidey6495
@deykiidey6495 8 месяцев назад
Your right bro good job
@rumor2751
@rumor2751 8 месяцев назад
I'm just going to believe this and like it so nationsquid sees it
@Piipperi800
@Piipperi800 8 месяцев назад
​@@w32u64 it's still a thing, but for one, USB SuperDrive doesn't work with anything other than Mac OS X I think. Also, early MacBook Airs came with a USB flash drive to restore the OS (with DVDs as well)
@pmc_
@pmc_ 8 месяцев назад
Malware like this is a good spooky story, but it's entirely infeasible as far as I can figure out. You'd need a zero-day in basically every single sound card driver ever.
@thatoneglitchpokemon
@thatoneglitchpokemon 8 месяцев назад
The posts were composed of near Halloween so probably just a joke but apparently NationSquid doesn't get it
@Operater_Silverhandman
@Operater_Silverhandman 8 месяцев назад
Trust me it's real bro I made it no cap n0 click bait 2025
@akam9919
@akam9919 8 месяцев назад
If you're the government, you theoretically could, "legally" and/or surreptitiously.
@DashDaSlaya
@DashDaSlaya 8 месяцев назад
That is so true I mean how can it infect via sound I get it can send data and download it and run code but to get the code you would already need a payload on the device waiting to hear the sound and download it so it would need wifi to get the payload on the devices so it is clear if it was real that person did a stupid job a isolating the devices from wifi
@SolitaryElite
@SolitaryElite 8 месяцев назад
you know hes a skid when he says 'zero-day' ahahah
@MysticClaws100
@MysticClaws100 8 месяцев назад
My favourite part about the nirvana bit at 10:18 is you're not even playing Nirvana, you're playing an obscure Green day track from their first album
@RiverboatPirate
@RiverboatPirate 7 месяцев назад
...Wait... -Was that not the joke?
@Krono159
@Krono159 7 месяцев назад
@@RiverboatPirate it is exactly the joke :b
@JuniperAbaddon
@JuniperAbaddon 6 месяцев назад
It's "At The Library", for those interested
@creatorglitch
@creatorglitch 5 месяцев назад
oh my god that's just beautiful
@simon6015
@simon6015 Месяц назад
At the library! Good stuff!
@TSFboi
@TSFboi 3 месяца назад
"there's a high pitched sound in this room and it's giving computers viruses" is the kind of information that makes someone crazy with paranoia
@elvendragonhammer5433
@elvendragonhammer5433 8 месяцев назад
I work in IT/security (in software, hardware repair, & programming) Some years a go I did work for a client where a virus spread to 12 of his computers- it was NOT this virus though, if it ever existed. However there was a similarity- wiping the drives did just let it re-install. Started checking to see if it was creating a hidden partition on the HD & reinstalling from there, or staying in memory in an expansion card (there were some similar to this that could hide in your dedicated video or sound card & used it's processor & ram as a staging area to re-infect the system after a re-install). After a bit of tracing I found out the virus was actually in the router itself, & had originally gotten access because the routers access info had never been changed after the factory preset. After flashing the routers bios it wasn't an issue anymore, still tracked down where it came from & added lines into the windows hosts file of the server & router to make sure that it'd never be allowed to try to go back to those IP's or any domain/subnet connected to them. Was a tricky lil bugger for sure, but ultimately just needed the right insecticide- me.
@NicksLocker
@NicksLocker 7 месяцев назад
Wow that is so cool! I was honestly wondering if it had to do with the router. Is there a name for this virus?
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
Smart of you to suspect the router, good job!
@elvendragonhammer5433
@elvendragonhammer5433 7 месяцев назад
I'm sure it has a name, but I don't know what it is. When I encountered it I was trying to fix 12 PC's + the router for a business client that got infected & didn't have the tools with me to do a flash dump of the bios from the router. He'd already lost thousands of dollars in revenue because of the downtime before he got ahold of me. So I didn't waste anytime killing it once I found out where it originated. Might not have been able to anyway- even if I had the tools with me; if it used weird voltages or pinouts, never done one on a router before anyway, so the software might not have worked either as they are usually written for a family of specific chips not just any random one- It would also matter if it was a PROM, EPROM or EEPROM. Some can't read/write certain types as well; sometimes not at all. I also haven't run into that router one again, apparently it was a shiny... Just for reference, even if you did find it or one similar & you let it loose outside of a virtual machine you can be prosecuted for it; even if it was an accident. The good antivirus companies, are like palworld trainers now- they have algorithms that as soon as they find a new virus, malware, trojan, in the wild it automatically contains, analyzes it & usually has a record of the first place it found it right down to the IP address & city. They also track it's spread & how many devices of what type, Servers, PC, android, linux, Mac, IOS etc that it infects & start working on an antivirus patch immediately. That's not including the other cyber security companies or ppl like me who report & upload stuff we come across. Then there's local police cyber crime units & government sanctioned ones too. (Also, Norton antivirus & McCafee are the bottom 2 worst on the list)@@NicksLocker
@elvendragonhammer5433
@elvendragonhammer5433 7 месяцев назад
Thanks, appreciated. Been doing this stuuf for a long time.@@thatoneglitchpokemon
@literallylondonn
@literallylondonn 7 месяцев назад
@@elvendragonhammer5433what would your recommendation be for a good antivirus?
@Nethuja_GunawardaneSL
@Nethuja_GunawardaneSL 8 месяцев назад
New fear unlocked: Science-fiction computer viruses
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
lol
@joshuamccutcheon
@joshuamccutcheon 6 месяцев назад
It's most likely a hoax, I wouldn't worry too much
@Nethuja_GunawardaneSL
@Nethuja_GunawardaneSL 6 месяцев назад
@@joshuamccutcheon Dude, it's all about the chill right here on he Internet.
@DamianOchramowicz
@DamianOchramowicz 8 месяцев назад
It is a fun creepypasta, nothing more. It would require an entire protocol to transfer the virus using speakers and microphone, with error correction and so on. It basically implies that you can control the operating system with microphone (saving executable file and then running it), you would need another protocol for that. Then you have problem of overwriting BIOS from the level of operating system, which I don't think is even possible. Back in the day you would have to run BIOS Setup before OS had even started to update it from the floppy.
@Mavendow
@Mavendow 8 месяцев назад
Not only is overwriting the BIOS possible from the OS, even the CPU microcode can be overwritten. How? It's called the IME or Intel Management Engine. Yes, Intel's AMT allows for a Ring -3 (negative three) rootkit, but it's turned off by default... Supposedly. We don't really know because the code is secret.
@ShadowEO
@ShadowEO 7 месяцев назад
I mean, Windows PCs have a table in their ACPI allowing one to embed binaries to be dropped and run during Windows boot. (WBPT) But in this case, I mean, Apple has used OpenFirmware or EFI for years, so secure boot and/or their inbuilt boot chain protection would've been a factor for a long while.
@infinitivez
@infinitivez 6 месяцев назад
​@@Mavendow The shorthand is just ME, and good luck flashing anything onto it without the Hoffman tables for that particular unit. That's not a thing you're likely to be able to even pull off on your own system, let alone anyone else's. Unless of course the decryption tables were leaked out of Intel and I'm unaware of it?
@UltimatePerfection
@UltimatePerfection 6 месяцев назад
Yeah, I don't think an ordinary cybercriminal would be capable of something like that. A dedicated state actor on the other hand?
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
@@Mavendow AMD does the same backdoor crap named Platform Security Processor.
@valmarsiglia
@valmarsiglia 8 месяцев назад
"Communicating information with sound is not at all unheard of. We've been doing it for hundreds of years." Yeah, I think we've been doing that for a bit longer, lol.
@ebmar
@ebmar 8 месяцев назад
QR code goes to The Beatles - All My Loving
@CyanRooper
@CyanRooper 8 месяцев назад
Missed opportunity to have the QR code be a Rickroll.
@T-Dawg75
@T-Dawg75 4 месяца назад
@@CyanRooperthat’s what I assumed
@MightyDantheman
@MightyDantheman 7 месяцев назад
That bone scanning malware isn't as ridiculous when you learn that HP's excuse for their printers requiring 1st-party ink cartridges is that it's possible for 3rd-arty ink cartridges to contain malware. Although, I guess the big difference here is that HP intentionally created a problem so that they could be the solution to said problem.
@Subspace.T.Tripmine
@Subspace.T.Tripmine 2 месяца назад
"It infects Linux, BSD, Windows". Me using templeos: You have no power here, Gandalf the grey.
@bise_moon
@bise_moon Месяц назад
Next update: it now works on TempleOS
@309electronics5
@309electronics5 Месяц назад
​@@bise_moon Last update: Virus got slapped by god
@HippieInHeart
@HippieInHeart 20 дней назад
Lmao, Deus Vult, fellow keyboard warrior of the cross XD
@JZB-2022
@JZB-2022 8 месяцев назад
The spookiest part? The MacBook Air NEVER had an optical drive of any kind.
@presidentkiller
@presidentkiller 7 месяцев назад
The only two ways this could be possible are: 1. Somebody working at the computer companies know about a series of vulnerabilities that make this possible, and is actively exploiting them. 2. Some government agency has access to a backdoor that was discovered by a third party that exploits it, or the government agency itself (either willingly or because they've been compromised) is exploiting it. As you said, this is a very expensive and complicated way to make malware, so only those two options kinda make sense.
@DinoTaken
@DinoTaken 7 месяцев назад
I... I don't think the government or an organization would be trying to hack people, they have no point to, and this happens rarely.
@thebobbrom7176
@thebobbrom7176 3 месяца назад
The 2nd one was the one i gravitsted towards if I'm honest The the vulnerability is on the BIOS then it wouldn't show up as a process on the computer so would be next to impossible to detect. And governments being able to shut down computers with a sound sounds too good for them to not at least try
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
​@@thebobbrom7176 The prebugged firmware may originally be installed by govt. But any e.g. antivirus programmer who coincidentally found a national trojan with code for accessing it, may disassemble it and sell that backdoor key over the darknet or do anything else malicious with it. So do not expect that undefeatable super-malware will necessarily come from a national bureau.
@brianm.7421
@brianm.7421 8 месяцев назад
Anyone who works with electronics knows that coils in circuits can generate high frequency sounds, since the coil vibrates when working at high frequencies, and sometimes it is audible. Excellent story, it's for a black mirror episode haha 😂
@MikePerreman
@MikePerreman 8 месяцев назад
Tfw you're constantly getting reinfected with that 60Hz line-frequency malware
@drako_claw
@drako_claw 7 месяцев назад
People forget that early Internet connections, especially early dial up (14.4k in particular) - the data connection was made entirely by sound. So you were receiving data via sound. The v.92 dial up modems were the first I saw that used a digitized connection after the initial dial in an handshake, which was still done by sound. (The noise of robots killing each other.)
@elbiggus
@elbiggus 8 месяцев назад
"A lot less options to choose from computer-wise in the 80s"? Citation needed! In the here and now there are essentially two basic CPU platforms - x86 and ARM - and while there may be a gazillion motherboard manufacturers the underlying architectures are fairly homogenised (particularly in the x86 world). In the 80s, however, we had a myriad of CPUs - 8088, x86, Z80, 6502, 680x0, TMS9900, etc. - and even computers that shared a CPU would often have wildly different architectures. In the UK in the 1980s we had the ZX Spectrum, BBC/Acorn, Oric, Amstrad CPC, MSX, Dragon, Atari 8-bit, Atari ST, Amiga, PC, VIC-20/C64/C128, Mac, and probably a bunch more I've forgotten. The 80s were a wild time!
@CazRaX
@CazRaX 7 месяцев назад
Not even the Wild West, it was full out caveman warfare for the computer verse. I watch videos on all the old PCs and it gives me a headache how many different, same part using, yet not at all compatible computers there were.
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
Wikipedia moment
@DinoTaken
@DinoTaken 7 месяцев назад
he said it can still happen
@HippieInHeart
@HippieInHeart 20 дней назад
True, back then pretty much every company built their own stuff. Nowadays we have people just going with either one of the two big players and there's no one else to choose from.
@Mempler
@Mempler 8 месяцев назад
UEFI and BIOS are still effectively the same. One of which are just easier to use. BIOS itself is a pain but very simple to use and implement. UEFI can be worse, UEFI implementations depend to have firmware bugs, super annoying shit when doing osdev But uefi has a lot of benifits like built-in boot-loader drivers and secure boot. and generally is indeed easier to use as it is a plain C api, every Win32 developer should be familiar with.
@infinitivez
@infinitivez 6 месяцев назад
a BIOS is the basic input output system and will always run in 16bit (where as UEFI can run under 32 or 64). - I find legacy bugs we used to run into far worse than any UEFI counterparts. But part of me does miss calling INT 13 for a quick reboot.
@jaymogrified
@jaymogrified 8 месяцев назад
Even if it’s not possible as written, I gotta give kudos to the “Bones” writer(s) who came up with the idea of malware carved into a skeleton; very creative and forward-thinking, especially if it’s theoretically possible for it to have done something under the right circumstances.
@fusseldieb
@fusseldieb 7 месяцев назад
But not blowing up lmao
@UltimatePerfection
@UltimatePerfection 6 месяцев назад
​​@@fusseldiebIf the malware stops system fans and overclock the components to the point of thermal failure, why not?
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
​@@UltimatePerfection You can reprogram a battery charging controller to set e.g. the cell voltage limit instead of 4.2V to e.g. 4.8V, so during the next charge it will go kaboom with a fireball. (Such tests were verified on ole Mac laptops.) In more sophisticated charge balancer chips it may be even possible to transfer charge from one cell to another to intentionally overcharge one of them to set it on fire without need of a mains connection to a charger. (An intelligent malware may wait until the device is left unattended tonight on a flammable sofa or such to also burn the house down.)
@cori11ian
@cori11ian 8 месяцев назад
This is clearly a hoax. The main reason being, as you identified, that any target computer would already need to be compromised in order for the microphone to be enabled and software would need to be running on the OS to interpret the sounds as code. Audio hardware will not operate unless the OS has the correct driver running. That this guy had it isolated in a lab, yet hasn't produced any evidence in over 10 years seals the deal.
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
The sound receiving backdoor is likely default part of the firmware requested by national agencies. In USA mobile phones are legally requested to contain a similar spy mode "roving bug" in its Baseband OS as official part of their mobile radio standard (i.e. sale of phones without would be illegal in USA).
@WolfPackGamingOfficial
@WolfPackGamingOfficial 8 месяцев назад
To be honest, a movie about AI turning evil and infecting computers due to a sound sounds like a cool plot. Nice video BTW!
@CyanRooper
@CyanRooper 8 месяцев назад
"In 2077 what makes someone a criminal? Spreading computer viruses by playing Despacito in public."
@Senjamin
@Senjamin 8 месяцев назад
imagining bird box but for androids hearing things
@memes_gbc674
@memes_gbc674 8 месяцев назад
@@Senjamin there used to be a problem with certain frequencies in music that blue screened old laptops with mechanical hard drives, like if you were playing the music next to the laptop it would just crash
@WolfPackGamingOfficial
@WolfPackGamingOfficial 7 месяцев назад
@@CyanRooper LOL
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
the sound sounds good 👌
@ErdrickHero
@ErdrickHero 3 месяца назад
Modems are literally just microphones and speakers relaying digital information in the form of sound. Congratulations on reinventing the modem.
@krissjacobsen9434
@krissjacobsen9434 8 месяцев назад
There is one possibility you didn't cover, and that is that the hardware shipped infected from the factory. Most computers are made in China (even MacBooks), and a lot of them are made from OEM manufacturers like Foxconn (even MacBooks). There has already been documented cases of chinese made american electronics "calling home" to chinese servers. If companies like Foxconn is instructed to ship computers and phones they make with infected firmware, they sure can. And then they can lay dormant until some weird code is transmitted via sound. Maybe even embedded into a hit song for all that I know. I believe this to be the most likely scenario, although this story itself seems very unlikely. All of it is theoretically possible, but to actually carry this out in the real world would be expensive and really difficult. Unless you're the corrupt government of one of the largest economies in the world.
@Amphibax
@Amphibax 7 месяцев назад
But in that scenario why should the virus make itself noticable? When your just stealing data its best stay hidden and never getting noticed. Still in theory one of the best explanaitions.
@gabrielv.4358
@gabrielv.4358 7 месяцев назад
thats awesome to know
@Amonimus
@Amonimus 8 месяцев назад
The fact that you've managed to transmit an image by noise just for demonstration is spectacular on its own.
@mrkoyunreis
@mrkoyunreis 8 месяцев назад
Not to break the vibe, but thats a really easy thing to do and there are lots of tools that will do it for you.
@Meta7
@Meta7 8 месяцев назад
You can draw literally anything on a spectrogram and then converting it to a sound wave. It's really not that complicated.
@alexanderkarren6455
@alexanderkarren6455 8 месяцев назад
Transmitting data via audio really isn’t that impressive nowadays
@lord_snigglebottom
@lord_snigglebottom 8 месяцев назад
technology is a wonderful thing ,,
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
@@lord_snigglebottom2 comma crisis oh no 😟
@hyperturbotechnomike
@hyperturbotechnomike 8 месяцев назад
Most BIOSes aren't too different from each other. They are often just licensed from Phoenix and the OEMs slap their custom GUI on top of it.
@ShadowSora8491
@ShadowSora8491 8 месяцев назад
About that Bones episode you're talking about: the reason Angela's computer went up in flames (according to the logic of the show, not necessarily real life) is because the virus not only disabled the computer's cooling system, but also disabled any fail-safes against the inital disabling, which caused her computer to overheat. Like you, NationSquid, I dunno if that would actually cause it to go up in flames or not, but I just wanted to add some context to that scene. Anyway, I like that you covered what is essentially an urban legend, while explaining some of the logistics of it, instead of just calling it a hoax and calling it a day. I definitely learned a few things from this video.
@Amphibax
@Amphibax 7 месяцев назад
Im no expert but I would assume a CPU would physicaly destroy itself from the heat before the computer could catch on flames
@ShadowSora8491
@ShadowSora8491 7 месяцев назад
@Amphibax I was only giving context to the scene and not claiming that they depicted things accurately.
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
You can reprogram a battery charging controller to set e.g. the cell voltage limit instead of 4.2V to e.g. 4.8V, so during the next charge it will go kaboom with a fireball. (Such tests were verified on old Mac laptops.) In more sophisticated charge balancer chips it may be even possible to transfer charge from one cell to another to intentionally overcharge one of them to set it on fire without need of a mains connection to a charger. While the Bones story is too madeup (binary code printed on a scanned skeleton), setting a battery ablaze by software manipulation is in no way impossible.
@afbastidas
@afbastidas 17 дней назад
While still farfetched, this Bones storyline is at least more believable than that NCIS episode in which two people were typing on the same keyboard at the same time to stop a hacker.
@ShadowSora8491
@ShadowSora8491 17 дней назад
@@afbastidas And how the hack was somehow stopped by Gibbs unplugging the computer, even though it was still connected to the network.
@Kyle-xv5kv
@Kyle-xv5kv 8 месяцев назад
Macbook Air's don't have CD drives.
@keaton_m
@keaton_m 8 месяцев назад
Great video. But the QR code example doesn't really work because standard it's built on has a lot of redundancy and error correction. That's the reason qr codes can have little images in the middle, the error correction fills in the missing data.
@redo1122
@redo1122 7 месяцев назад
The same way as CD can be scratched, but still read properly
@_secret-star
@_secret-star 8 месяцев назад
There are BIOS or UEFI viruses. There are even UEFI or BIOS scanners, like ESET has a UEFI scanner in it's EIS suitue. The "spread through the air" "don't care about airgap" is not very realistic.
@petevenuti7355
@petevenuti7355 8 месяцев назад
I thought those were only for the early generations of UEFI
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
@@petevenuti7355not only that but some modern pcs too
@petevenuti7355
@petevenuti7355 7 месяцев назад
@@thatoneglitchpokemon really? without having to disable secure boot or anything other security features? If that's true, it makes the whole UEFI thing seem like a pain in the ass & waste of time . Just run a Linux BIOS with emulator
@DinoTaken
@DinoTaken 7 месяцев назад
no airgap is actually a real thing
@thatoneglitchpokemon
@thatoneglitchpokemon 6 месяцев назад
@@petevenuti7355well, you are right, without secure boot, it's kinda impossible. still saying that, some legitamite services require secure boot to be turned off, and that can lead to some viruses leaking into uefi
@ordovicianinnova
@ordovicianinnova 8 месяцев назад
This is like a computer-based urban legend.
@Hello09294
@Hello09294 4 месяца назад
egg man !!🥚
@Alej0731
@Alej0731 8 месяцев назад
What MacBook Air has ever had a CD-Drive??
@DinoTaken
@DinoTaken 7 месяцев назад
You can use Music to listen to the music on your CDs. In the Music app on your Mac, insert an audio CD into your computer's CD or DVD drive, or into an external drive that's connected to your computer. Apple said that idk
@KangJangkrik
@KangJangkrik 8 месяцев назад
Sending data thru sound without errors is technically possible. We can use two different frequencies to represent high bit (1) and low bit (0) then add error correction such as hamming code. However, implementing this on BIOS is almost impossible because hacker need to squeeze the required hardware drivers into teeny tiny BIOS storage.
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
The claim that acoustic background noise would make it fail is nonsense. Check how noisy e.g. the GPS satellite signal is, but they use plenty of CRC to reconstruct valid data. It only makes a modem connection slower.
@KangJangkrik
@KangJangkrik 3 месяца назад
@@cyberyogicowindler2448 CRC can reconstruct? I didn't knew that before
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
​@@KangJangkrik I mean error correction algorithms. CRC/checksums are the basis of that.
@General_Grievous1998
@General_Grievous1998 8 месяцев назад
Babe wake up, new nation squid video dropped
@Ghs6
@Ghs6 8 месяцев назад
Already awake
@tealover70
@tealover70 8 месяцев назад
I’m wide awake honey!!!
@brian8507
@brian8507 8 месяцев назад
This meme died years ago. Stop
@thatoneglitchpokemon
@thatoneglitchpokemon 8 месяцев назад
In Australia it's 1:24 perfect time for RU-vid
@lwfawn
@lwfawn 8 месяцев назад
Erm, actually, the channel’s proper name is Nation’s Quid. Please reconsider your comment.
@gstcomputing65
@gstcomputing65 8 месяцев назад
That's why I only use OS/2 Warp 4. I can't do anything with it, but I've never got infected with a virus.
@JelloBoi-xr4qe
@JelloBoi-xr4qe 7 месяцев назад
Imagine a bioweapon that changes your eyes so that you become a computer virus on webcam
@PeeperSnail
@PeeperSnail 7 месяцев назад
The fact the subreddit dedicated to it is also mostly just about "electromagnetic targetting", mass surveillance, mind control, sound weapons, etc. etc. as well as being abandoned, there's not a lot of credence to the people outside of the original guy who claim to have also encountered the virus.
@1will2000will1
@1will2000will1 8 месяцев назад
What if he was trying to get people thinking about the security of other parts of computer hardware and software? Sure, in this specific representation, the likelihood of a virus acting that way is slim... but it makes you wonder what else is actually possible.
@gabriela7348
@gabriela7348 8 месяцев назад
I remember when one time Mutahar from SomeOrdinaryGamers said that when EAS is used in Japan some special signal is broadcasted that turns devices (like TV's) on to show the emergency broadcast (and then they start to emit that sound to activate more devices). No idea if it would work on PC's as well tho
@Zuxtron
@Zuxtron 8 месяцев назад
I'm going to assume that Japanese televisions are specifically programmed to detect that sound and display the broadcast when they hear it. You couldn't just play that sound to any TV and have it react that way.
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
If that was possible loads of trolls would just play the sound
@vonslask5749
@vonslask5749 2 месяца назад
I found the part about the virus being transmitted through audio being a bit silly. Most regular speakers and microphones are locked somewhere between 20Hz - 20kHz, which is the range of sound audible to the human ear.
@ExploringNew1
@ExploringNew1 8 месяцев назад
I don't have a microphone so I don't have to worry about this extinct virus 🗿
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
Lol
@ryzenfox5688
@ryzenfox5688 8 месяцев назад
I’m surprise you didn’t talk about SSTV at all, it’s what nasa used to send images back from space and such it’s really cool
@Cowloverdude
@Cowloverdude 8 месяцев назад
Yes absolutely really cool! Unfortunately the SSTV transmitter on the ISS is currently broken and awaiting repair last I checked :(
@unamelable256
@unamelable256 6 месяцев назад
If you think about it that way. Such a virus could exist today. If it's meticulously customized with AI. You give a database for the AI to find a loophole, or a zero-day bug. and uses it to exploit it. If the person who infected the computer has a GPU capable of tensor kernel computation. The virus could technically adapt to every piece of equipment in range. Right down to the ISPs that provide internet access and the country's military. If you know the fact that modern GPUs, even in the budget class, don't come without hardware AI features. Viruses based on it are very real. We need to wait a little while until users have more common PC's like that. Of course this is one possible scenario that could happen in a crazy minority - but it is very real.
@bank8489
@bank8489 Месяц назад
alongside all the other points people are making here i'd add that most microphones of the era had a quality so terrible they likely couldn't pick up these supposed frequencies anyway. plus, many many devices did not have microphones at all. plus plus, there were many different soundcard drivers. there are so many reasons (other than these few that i immediately thought of) that would make this truly impossible
@tylern6420
@tylern6420 8 месяцев назад
This would require physical manipulation of the BIOS chips, which is impossible on a large scale
@UnrealVideoDuke
@UnrealVideoDuke 7 месяцев назад
Not the first virus to spread through the air. Older cellphones were retransmitting a virus that was only known to drain the battery faster because it turned up the antenna gain way before this instance. I was previously laughed at by an IT technician after I told them that I had seen a virus hit my PC's BIOS. Anything that is programmable can be volatile. Your "UEFI" works at a High Level. Most viruses that affect the BIOS are at a Low-Level which some are programmed to inject code into the host OS. They can even reach internet channels if they are programmed to do so. Low Level programming is well ahead of any of the brains of any educated programmer of today because they were never taught to utilize it. Most programs run on 3-5 tiers of High-Level programming and will be infected if any lower tiers are affected in some way. Ok, I'm rambling... For your "Air Virus". It is known that some CPU's have an address volatility problem where if an instruction was sent to an address it would execute it. The sound of a computer is controlled by a DAC and that DAC communicates on a CPU BUS. If a certain set of instructions were to leak past where the CPU would mistakenly run the code it would become infected. The code would not have to be majorly complex. Just the code would have to act if it was part of the CPU bus to be executed. It would literally bypass the OS, UEFI and BIOS directly hitting the CPU. The code itself can be smaller than this following string of text... "Open sound device. Transmit code. Save code." It could be more complex but not much needed to be of any great size. We are talking about bits and bytes here working at the lowest level where you only can see the highest level unless you have the tools to read each instruction as it happens which does need specialty equipment
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
Early AMD K6-series CPUs had a bug that could crash them by reading certain bit patterns (even within e.g. a jpeg picture) and so caused mysterious lockups. I don't know if this could actually execute code, but if the bits came decoded from audio-in (I very much doubt that it is possible without CRC error correction) it hypothetically might be possible to be fooled to execute arbitrary code only played as sound into a microphone.
@multi-mason
@multi-mason 8 месяцев назад
That QR Code probably would have scanned just fine. QR Codes typically include error correction. The image you transmitted could have been formatted with error correction as well.
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
Thinking about this I should probably scan it
@_SYDGAMING_
@_SYDGAMING_ 8 месяцев назад
I presume this is the same kinda thing when you call a mobile but it's still ringing but breaks for a slight second where you can hear the other person's phone but hasn't picked up yet. And continues ringing
@Azurethewolf168
@Azurethewolf168 8 месяцев назад
What’s that?
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
What's that? Really?
@Fanaticalight
@Fanaticalight 14 дней назад
7:05 Even then, a virus that was programmed to exactly, but **loosely** do that was CIH, and all it ever did was trash the BIOS of specific motherboards back in the 90s. EDIT: It's a very good hypothetical 'computer virus', makes for a great Black Mirror episode. The only thing that really comes close is viruses that are able to backdoor and infect routers and the firmware itself. Though, with TPM and memory integrity being pushed a lot more these days, it's becoming more and more of a hypothetical. From what I know, and someone can correct me on this, but WIndows booting into BIOS mode from the desktop can be done on specific devices still, and so can putting a device into flashmode using an application, but even that would require physical input to continue with the installation from the user, along with a very specific BIOS file meant for the motherboard, would it not?
@SamCoder.
@SamCoder. Месяц назад
Bruh... No MacBook Air had a CD Drive💀 GOT YOU!!
@ipissinlitterboxes
@ipissinlitterboxes 8 месяцев назад
Listening to this at the gym, never missing a a new nation squid vid
@justinhamilton8647
@justinhamilton8647 8 месяцев назад
don’t skip leg day brother
@pixelcrow_
@pixelcrow_ 8 месяцев назад
hell yea ,, this channel is the best for watching videos from while eating a meal, perfect entertainment. i was so excited when i got the notif that this was uploaded the other day and i finally have some time to myself to sit down and enjoy it
@guyblack9729
@guyblack9729 8 месяцев назад
I'm surprised the Intel Management Engine or AMD Platform Security Processor weren't considered as possible parts of the explanation
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
Exactly. The sound receiving backdoor is likely default part of the firmware requested by national agencies. Mobile phones are legally requested to contain a similar spy mode "roving bug" in its Baseband OS as official part of US mobile radio standard (i.e. sale of phones without would be illegal in USA). UEFI and BIOS are made by few companies and differ only in their config, thus the same sound modem code can easily run on many different hardwares.
@Core_Of_The_Void
@Core_Of_The_Void 8 месяцев назад
It’s impressive how Pwn2Own still happens yearly to this very day even after the BadBIOS incident!
@its_deer
@its_deer 2 месяца назад
my guy looks like the 90's "mature for my age" 19y old skater who smokes in the skatepark that my parents told me not to hang out with
@the_pseudo_nim
@the_pseudo_nim 7 месяцев назад
"Oh I love Nirvana! They make the best clothes" Really sent me. 😂😅🤣
@taylorwoolston8856
@taylorwoolston8856 8 месяцев назад
I'm not a professional computer scientist or anything, but even I know this is total baloney.
@annoythedonkey
@annoythedonkey 7 месяцев назад
What if you created a virus that made itself look like a device that presented itself as a WiFi network?
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
​@@annoythedonkey Because privacy and brain protection aware people refuse to use wifi at all.
@Bboyman1150
@Bboyman1150 7 месяцев назад
6:28 malware can exist in the hard drive’s firmware persisting after wipes
@dpennington19
@dpennington19 8 месяцев назад
The vocal fry on this man. This is the voice Malware would speak with.
@bullets4luv
@bullets4luv 8 месяцев назад
If anyone was wondering, the QR code leads to a Beatles song. I'm just happy it wasn't a Rick roll or the Josh Hutcherson edit.
@yoshiyajoshuakiryu3198
@yoshiyajoshuakiryu3198 7 месяцев назад
I worked in the government as an it tech. We had a virus that made the computer “sing”. We had to flash the bios and low level format the drive. So it did exist. And I hated that. We lost a lot of data because users refused to save to network. 😂 Luckily, he was in a very well shielded office using…Windows ME. Yeah. I know. 😂
@LunaStar666
@LunaStar666 8 месяцев назад
To me it just sounds like a creepypasta. Plus, since there's no evidence, I personally believe, it's not real.
@joshuamccutcheon
@joshuamccutcheon 6 месяцев назад
It's most likely exactly that, a creepypasta hoax.
@The-eater-of-flesh
@The-eater-of-flesh 8 месяцев назад
WE GETTIN OUT OF THE COMPUTER VIRUS WITH THIS ONE ‼️‼️‼️💯💯💯🔥🔥🔥💥💥💥🗣️🗣️🗣️
@corpix
@corpix 8 месяцев назад
How would the infected computer be able to tell the uninfected computers through sound if they weren't listening? Meaning if the mic isn't on.
@DinoTaken
@DinoTaken 7 месяцев назад
radio waves :D
@jeremyandrews3292
@jeremyandrews3292 8 месяцев назад
It's very unlikely that this does exist, but if it does, then it will probably be discovered that this is some kind of PRISM program-level backdoor discovered by someone who wasn't supposed to find it. You know, all those conspiracy theories about how your microphone can secretly be turned on at the BIOS level in a way software can't detect, so the NSA can listen in? If that turned out to be true, then it's equally possible that such a backdoor would also allow injecting code into the BIOS itself by playing a specific sound, if they do not like what the person is doing with their system and want to put a stop to it. There are some common components of UEFI firmware that are common to all BIOS manufacturers. It's absolutely true that this attack vector wouldn't be possible if nothing were programmed for a protocol that could translate sound into data. It also shouldn't be possible if microphones are correctly turned off at the hardware level and not listening when not in use by software. But if they are always on at the BIOS level and listening on some hidden protocol, well... then the attack is possible and ultimately a government somewhere is responsible for making it possible on purpose, and they should be held accountable if this is real. I don't believe an attack like that is possible unless someone out there intentionally inserted a backdoor into most computer's UEFI firmware to make it possible, on purpose. Possibly if it wasn't our government, then Russia or China leaned on the UEFI manufacturers and got this put in. It would be that level of interference.
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
советский россии хорошо !
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
Also mobile phones are legally requested to contain a similar spy mode "roving bug" in its Baseband OS as official part of US mobile radio standard (i.e. sale of phones without would be illegal in USA). That PCs need to contain such backdoors for use by national bureaus is absolutely plausible.
@melsbacksfriend
@melsbacksfriend 6 месяцев назад
One thing worth noting is that error correcting code (ecc) exists. It's a means of putting redundant bits in data in case parts of the transmission are lost. One place you'll commonly see this is in methods of optically encoding data such as qr codes, bar codes and cds.
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
CRC is the most basic part of every modem standard, so transmitting a picture the analogue way like in this example is misleading or even needs to be rated disinformation.
@vrclckd-zz3pv
@vrclckd-zz3pv 8 месяцев назад
My phone can read the QR code at 16:56 perfectly line. The QR standard includes error correction bits for when a QR has been partially occluded.
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
It's hilarious that nationsquid has no idea about this when there are 5 comments about error correction
@thepetrarcticwar2778
@thepetrarcticwar2778 7 месяцев назад
BadBIOS would have completely pwned every computer system in existence that wasn't either horribly outdated, running a highly obscure operating system (Haiku, OpenVMS, AmigaOS) or running on an obscure processor architecture (i.e. SPARC64, PowerPC, etcetra)
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
*if it did even exist
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
The sound receiving backdoor is likely default part of the firmware requested by national agencies. Mobile phones are legally requested to contain a similar spy mode "roving bug" in its Baseband OS as official part of US mobile radio standard (i.e. sale of phones without would be illegal in USA). UEFI and BIOS are made by few companies and differ only in their config, thus the same sound modem code can easily run on many different hardwares. Read about the Intel Management Engine and AMD Platform Security Processor to understand which parts get involved to handle such a driver.
@StarGateSG7
@StarGateSG7 8 месяцев назад
Thought I'd chime in here that you can put BIOS-embedded viruses into ANYTHING that has a flashable BIOS chip in it! Graphics cards, Network cards, Mainboard BIOSes, USB and Sound Driver BIOSes and a whole lot more! In the old days we embedded viruses into the Adlib and Soundblaster audio card bioses which recorded keystrokes all day long into non-volatile RAM or hiddens ectors in local free HARD DRIVE space and then exfiltrated the recorded keystrokes into compressed data files that were then played back as above-human-hearing ultrasound beeps and boops coming from the inside-computer-case speaker which were interpreted by "spies" or packages left outside offices or via cleaning personnel that recorded the beeps and boops for later interpretation. Even if a machine was turned OFF, the adlib or soundblaster card could STILL beep and boop at ultrasonic frequencies since it was self-powered long-enough to sound the bits and bytes as sound-based data. The on-site counter-intelligence personnel were always looking for RADIO WAVES and not ultrasonic sound waves so these were always overlooked! The sonic range was limited and data exfiltration was SLOOOOOOW but it worked very well! It's how Soviet, Chinese and other target agencies were spied upon in the 1980's and 1990's Nowadays, I can exfiltrate data from a computer by pulsing any onboard LED lights by blinking them based upon amplitude, time, frequency at very high data rates. I can also use the electrical whine of CPU and GPU components to exfiltrate recorded keystroke or on-screen image-captured data by purposefully pulsing or writing to certain parts of the CPU and CPU or your hard disk or SSD drive to create a high frquency or low-frequency machine-discernable whine or machine-discernable EM field waveform that contains the data I want to grab from you. Most agencies overlook such techniques but we don't! I can even blink and change the refresh rate of your display in order exfiltrate data OR even embed Steganographic data into the on-screen monitor display as it comes out the GPU card or via EM fields that are part of the power-down/power-up circuits or part of any on-display LED light to allow for data exfiltration. Any part of your PC or game console or TV that can click, whine, hum or beem and boop can be used to exfiltrate your captured private data whenever we feel like! I can get YOUR DATA from ANYWHERE at ANYTIME !!!! V
@BrainStormzFTC
@BrainStormzFTC 8 месяцев назад
That kind of stuff is pretty well documented, (though some of your details are off) but it still requires some way to infect the target system to load the spyware in the first place.
@nickwallette6201
@nickwallette6201 8 месяцев назад
AdLib BIOS? Must be using the flash memory in the LM386.
@StarGateSG7
@StarGateSG7 8 месяцев назад
@@BrainStormzFTC I have the details down quite pat since I KNOW the methods directly involved! The Adlib cards were BIOS changed at the Burnaby, BC, Canada fcatory in the 1980's BEFORE they were shipped out and the Soundblaster cards had the changes made just after the Singapore/Malaysia warehouse and/or factories shipped them out. The Soviet tended to buy LOTS of computer gear from West Germany at the time using "secret purchasers" who were actually tracked by various Western 3 and 4 letter agencies and so West Germany was flooded with the cards at specific dealers to ensure that the changed cards would be bought by the Soviet-controlled purchasers OR that a specific target purchaser person was shipped the changed cards. The Soviets weren't dumb so they CHECKED OUT the computer systems quite intensely BUT various HIDDEN changes ensured that the checks they did do would MATCH the expected checksum output values of both the unchanged AND changed cards. Cleaning and maintenance personnel were EXTENSIVELY compromised to unwittingly gather exfiltrated data from keystroke recordings and MS-DOS-screen ASCII-based data captures and higher level graphics workstation-specific bitmap screen captures. Those old computers had MINIMAL MEMORY usually One Megabyte to Four Megabytes (NOT GIGABYTES but MEGABYTES!) of System RAM and maybe 5 to 20 Megabyte disk drives so secret disk sectors had to be hidden and managed very well in order to store the daily recordings made by the changed BIOS software so the IT personnel wouldn't notice the changes or recordings. Compression was a VERY BIG DEAL in those days and the NSA (National Security Agency) in the USA spent MILLIONS of USD on PhD-level Math experts doing nothing but designing and coding advanced compression and encryption algorithms still used and KEPT SECRET EVEN TODAY! Using an Intelligence Agency Example, those data exfiltration techniques in around the mid-1980's were but ONE WAY western agencies figured out just how far ahead the Soviets were in DESIGNING and TESTING Explosive Lensing techniques used in Large-Yield Nuclear and High-Explosive Conventional weapons system development where they designed and welded thick steel panels to make 8 foot thick (2.5 metres thick!) hollow spheres out of solid steel so they can record and figure out HOW explosions actually detonated, propogated and reflected INSIDE those thick spheres. The data recorded in real-time at the physics-based level, let the Soviets become able to model NEW explosive designs to make SMALLER AND MORE POWERFUL weapons systems than the west could make! Just that development put them 15 to 20 years ahead of the west! That is just ONE example of what was found out! V
@StarGateSG7
@StarGateSG7 8 месяцев назад
@@nickwallette6201 There were small memory spaces AND added non-volatile RAM-space where data could be processed hidden on the changed cards. The 8-bit microcontrollers were good enough to do quite an amount of processing. The Apollo SPACE program that landed people on the Moon has MUCH LESS CPU horsepower than the Adlib and Soundblaster audio cards of those days in the 1980's and 1990's! Network cards, GPU cards and RAM expansion cards were ALSO extensively modded to be shipped over to West Germany to ensure the Soviets would get modded gear that could be spied upon by western agencies! You should have seen DefSec Caspar Weinberger's face in the mid-1980-'s face on the day he found out the Soviet Gas and Oil Pipelines got blown up REAL GOOD by INTENTIONALLY MODDED micro-controllers and controller software that the Soviets stole and/or bought from the West! It was the Stuxnet of the 1980's using POSITIVELY ANCIENT computer CPU horsepower! My smartwatch has more CPU horsepower than ALL of those systems combined! The Western Intelligence did quite a lot with the very limited processing power they had! Nowadays, I have a Terabyte of System RAM worth of at-my-office Super-Workstation that has over a PETAFLOP worth of GPU horsepower attached to it! What they could have done with that sort of CPU/GPU horsepower in those days would be mind-boggling! And the parent company paid less than $250,000 CDN for it all just a couple of years ago! The average STUDENT today has more CPU/GPU horsepower in their smartphone and laptop than the ENTIRE NSA had in 1985! V
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
The last paragraph is a little extreme...
@goregrindisthebestgenre
@goregrindisthebestgenre 8 месяцев назад
Possibly your best virus video.
@Raveheart
@Raveheart 7 месяцев назад
HAM radio operators have their own thing of sound-to-data, called SSTV. They send a ~30 second beepidy-boop through the shortwave band and the receiver, who can be thousands of miles away unter certain circumstances, can restore a low resolution still image from that. Basically you can send memes around the globe without internet. Sometimes even the ISS sends SSTV images, but you gotta plan the reception, because you can only get the signal if the station is visible at "your" sky. But it gets even crazier, a lesser known standard called NBTV whis is even lower resolution, but the image can move like a GIF.
@FragileJesseLord
@FragileJesseLord 7 месяцев назад
16:57 The QR code is still readable! Thanks, error correction :D
@WildWildWeasel
@WildWildWeasel 7 месяцев назад
i keep thinking whoever created badbios/if it actually exists, was the same people who made windows 11 and the requirement to have "secure chips" to leave large swaths of the internet without being able to upgrade.
@RogueCarrot
@RogueCarrot 8 месяцев назад
MacBook Airs don't have optical drives. Never did. Even when Macs still had optical drives. That right there would be enough to discredit him in my eyes. lol
@chartreusechartroos
@chartreusechartroos 8 месяцев назад
my favourite example of sound being used to communicate is the 2012 and boom furbies using ear-bleeding ultrasound
@stuffz4040
@stuffz4040 6 месяцев назад
I mean as a 2000s kid, these virus lore are a lot better than the sonic.exe tech horror I was brought up with
@emilypinto2346
@emilypinto2346 6 месяцев назад
The way you explain stuff for us is so good. Like using the example of covering up a part of a picture of urself vs a QR code and the example of speaking French to a person who speaks English and the examples like that are SO helpful for me to understand. I subscribed because you take complex topics that I want to understand and make them something that I can understand and I love it
@themonkhinekie3243
@themonkhinekie3243 7 месяцев назад
years from now, the future when we have bionic eye, upgradable memory then the virus spreading from pc to humans is normal
@tylerdurdin8069
@tylerdurdin8069 7 месяцев назад
It dont need to be a bios virus. It could have imbedded itself in the factory image of the backup so that it couldnt be removed by a reset. Got 4 bugs myself that does this.
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
Some consumer grade Lenovo laptop types came with Chinese adware infested bios, that automatically reinstalled adware/spaware into the Windows partition when installing Windows.
@s0men00bb
@s0men00bb 8 месяцев назад
You forgot hardware instruction sets , hardware abstraction layers which are essential for any computer , then error checking and correcting etc which are all hardware based as well as software , you can implement AES-NI instruction in software if your hardware supports it , just like the TPM thing now. Then , there are metadata that OS uses to identify stuff , not much nowadays , but in past it was very important. In early days of computing , and even 10 years from that story , you had issues if your program was x86 based that it wont run on AMD , and so on , list is long , but you can perfectly do it on platforms like Raspberry Pi , Arduino and similar , as hardware and firmware isn't so smart , it interprets machine level code as it's thrown at it , without asking many questions. You can dig deeper in JFIF and EXIF exploits as they are very basic example on how computers interpret things. DOS prompt wont prevent you from killing entire OS if you told it do so , nor will any other interpreter as long as it understands what it receives.
@ExploringNew1
@ExploringNew1 8 месяцев назад
11:58 "communicating with sound is not at all unheard of" that's because you have to hear to communicate with sound. Even animals do it
@jstarstudios7110
@jstarstudios7110 8 месяцев назад
If you tell an English-speaker to make you a sandwich, in French, they will probably understand - the French word for "sandwich" is "sandwich"
@ningayeti
@ningayeti 7 месяцев назад
You almost figured it out when you mentioned Stuxnet. Yes; if it exists the only entity with the cash, brains, and manpower to pull it off is a nation state. Additionally; a vector alrrady known to be vulnerable are the video bios' of certain manufacturers leading to the possibility of a system bios being infected by a video bios
@MissFoxification
@MissFoxification 7 месяцев назад
Transmitting data through speakers is not only plausible, it has been done. A company called Silverpush distributed software that would listen for ultrasonic beacons embedded in advertisements. The FTC put an end to that. But as you said, there needs to be software listening for it. No bios is listening for audio input. It's possible one of his devices had a bios that accepted unsigned updates and that he already had malware on the system that facilitated that... but occurring on multiple devices with different OS', I find that extremely unlikely, airgapped or not. Transmitting the data via sound waves is not really an issue. Error correction exists and if you have enough time you can transmit the files... but nothing is listening for that. It also wouldn't be a gentle whine, it would be rather active. Ever heard a POGSAG pager blast over the airwaves? It isn't "gentle".
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
The sound receiving backdoor is likely default part of the firmware requested by national agencies. Mobile phones are legally requested to contain a similar spy mode "roving bug" in its Baseband OS as official part of US mobile radio standard (i.e. sale of phones without would be illegal in USA).
@andythedishwasher1117
@andythedishwasher1117 8 месяцев назад
Cover your asses, developers. Log every damn thing related to auth you can find and make sure the logs are stuffed in a vault somewhere. If this happens on systems running your software, you don't wanna catch that blame hammer.
@SergeyVikhlopov
@SergeyVikhlopov 7 месяцев назад
The presentation of this video gives me some good old tabloid vibes. Had a good laugh, haha)) That said, this virus is somewhat plausible. At least in theory. BIOS have access to wifi and bluetooth hardware, so once it has taken control of that it can potentially spread itself through those networks onto other computers. At the same time though, the level of sofistication of a malware like this is unimaginable. Storing something so powerful on a very limited resources of a BIOS ROM doesn't seem possible for something so underpowered as macbook air. This one seems to be fake, but with some tweaks it might be a good script for a halloween horror story aimed at IT audience!
@Spidertails
@Spidertails 7 месяцев назад
Strangely enough, my family was watching this on the tv, and as soon as they started testing out their audio theory, and the noise was playing, our tv went wonky :/ I know it probably wasn’t caused by it and is just a coincidence, but we’ve been laughing about it for a while
@albertwesker2k24
@albertwesker2k24 8 месяцев назад
Something very similar happened to me back in 2013. I had to physically change the actual HDD because wiping the whole system didn't actually work.
@TeagueChrystie
@TeagueChrystie 8 месяцев назад
THE MARILYN MONROE PROOF. AGHHHHH. HOLY SHIT.
@TeagueChrystie
@TeagueChrystie 8 месяцев назад
Like, obviously I knew this was possible in terms of encoding data, I just had never thought of it as an air-gap-circumvention strategy.
@REALPapaLags
@REALPapaLags 5 месяцев назад
I like that I learned about how computers, WiFi, and Bluetooth work through sound!
@TrineDaely
@TrineDaely 7 месяцев назад
Some computers also have IR sensors that are used for communicating. Given the chance I turn off everything like that. I still expect to see malware spread via RFD.
@coffeecat086
@coffeecat086 7 месяцев назад
The first thing I thought of when you spoke about the transmission through sound was that you would have to turn the microphone on in the first place, aside from all the other technical aspects, that’s the bit that seems off.
@Fs_ailure
@Fs_ailure 8 месяцев назад
tf why isnt this channel more popular
@slickstretch6391
@slickstretch6391 7 месяцев назад
"Every computer's BIOS is different." *American Megatrends has left the chat.*
@cyberyogicowindler2448
@cyberyogicowindler2448 3 месяца назад
UEFI and BIOS are made by few companies and differ only in their config, thus the same sound modem code can easily run on many different hardwares. Read about the Intel Management Engine and AMD Platform Security Processor to understand which parts get involved to handle such a driver.
@SametKaratas-db1xu
@SametKaratas-db1xu 3 месяца назад
8:51 that's why Android is better because, Android doesn't have a BIOS. Only encrypted so, Android is more secure
@thenickster015
@thenickster015 Месяц назад
10:20 don't think I didn't notice the very obscure very early Green Day track! Well played!
@Ṯaxəṣ
@Ṯaxəṣ 8 месяцев назад
I was wondering when the legend would upload once again. I love these types of videos! :)
@ErdrickHero
@ErdrickHero 3 месяца назад
"I'm speaking in an accent beyond her range of hearing"
@OuterGalaxyLounge
@OuterGalaxyLounge 8 месяцев назад
Fix the malware that made you say "costed" instead of "cost."
@heavyd9949
@heavyd9949 8 месяцев назад
I had a bad case of computer virus infecting my PC back in 2010. It would disable the task manager on Windows XP and could not be deleted through a format and reinstalling of the OS. Don't know if it infected the BIOS or not but a computer repair shop was able to cleanse whatever was infected and put the PC in working order.
@tylern6420
@tylern6420 8 месяцев назад
was this some sort of permission block virus the only thing that comes to mind is that the virus got admin perms and locked all of your actions
@tylern6420
@tylern6420 8 месяцев назад
but im unsure about the formatting part
@thatoneglitchpokemon
@thatoneglitchpokemon 7 месяцев назад
How to cleanse your pc: Step 1: SCRUB
@Saavik256
@Saavik256 7 месяцев назад
Another good example of transmission of images via sound is SSTV. Also, darn, it's been literally decades since I last saw an acoustic coupler.
Далее
The Very First Mac Virus | Leap.A
16:47
Просмотров 427 тыс.
Frutiger Aero | The Promised Future We Never Got
24:31
YouTube's First Scam
19:33
Просмотров 459 тыс.
YouTube's First Urban Legend | Username666
31:47
Просмотров 460 тыс.
Mario Downloads Internet Viruses
8:16
Просмотров 10 млн
ILOVEYOU: Earth's Deadliest [Computer] Viruses
22:34
Why Piracy Will Never Stop
26:12
Просмотров 311 тыс.
5 Disturbing Things Hidden in Microsoft Windows
13:56
Просмотров 198 тыс.
The Man Who Stole MySpace | Samy
18:53
Просмотров 138 тыс.